Mandiant says a wave of recent ShinyHunters SaaS data-theft attacks is being fueled by targeted voice phishing (vishing) attacks and company-branded phishing sites that steal single sign-on (SSO) ...
Mustang Panda gave CoolClient new bells and whistles, including clipboard monitoring.
A newly discovered advanced cloud-native Linux malware framework named VoidLink focuses on cloud environments, providing attackers with custom loaders, implants, rootkits, and plugins designed for ...
Abstract: Rootkits are a type of malicious software designed to exploit system vulnerabilities and evade detection by traditional security mechanisms. This study proposes a comprehensive approach for ...
Abstract: Cyber-physical microgrids are vulnerable to rootkit attacks that manipulate system dynamics to create instabilities in the network. Rootkits tend to hide their access level within microgrid ...
"Shall we give forensics a little work?" Singularity is a powerful Linux Kernel Module (LKM) rootkit designed for modern 6.x kernels. It provides comprehensive stealth capabilities through advanced ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results